scholarly journals Analysis of performance parameters for wireless network using switching multiple access control method

2021 ◽  
Vol 4 (9(112)) ◽  
pp. 6-14
Author(s):  
Sameera Sadey Shijer ◽  
Ahmad H. Sabry

The developments of wireless networks have directed to search for opportunities of a broad diversity of improved and new networking contributions. Wireless Asynchronous Transfer Mode (ATM) is a non-synchronous or random mode of transferring information. The advantages of circuit switching include dedicated connections and guaranteed traffic parameters and the benefits of packet switching are the efficiency at the physical layer and a more cost-effective design. ATM is the only protocol that offers the best of both communication methods. Although the Variable Bit-Rate (VBR) transmission presents a promising prospective of stable data quality, it is usually accompanied by network traffic overload and cell packet loss, which extensively weakens that potential. This work overcomes these concerns by developing a switching-based multiple access control model to improve the data transmission performance of wireless ATM. Therefore, this work discusses the effectiveness of the developed approach to minimize the cell packet losses and network traffic overload in wireless ATM. Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. Using OPNET 10.5, the results show that the presented switching-based multiple access control model can achieve a throughput value of 98.3 %, data transmission delay of about 40.2 ms, and 0.024 % of packet losses during data transmission between the source and destination. It is demonstrated that the introduced method effectively transmits information without creating any network complexity and delay

2011 ◽  
Vol 3 (4) ◽  
pp. 44-51 ◽  
Author(s):  
Oluwafemi S. Ogunseye ◽  
Olusegun Folorunso ◽  
Jeff Zhang

Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because it reduces the adverse effect of stringent security measures on the usability of KMSs. However, the CAC model, like other models, e.g., Role Based Access Control (RBAC), Time-Based Access Control (TBAC), and History Based Access Control (HBAC), does not provide adequate protection against privilege abuse by authorized users that can lead to industrial espionage. In this paper, the authors provide an Espionage Prevention Model (EP) that uses Semantic web-based annotations on knowledge assets to store relevant information and compares it to the Friend-Of-A-Friend (FOAF) data of the potential recipient of the resource. It can serve as an additional layer to previous access control models, preferably the Congenial Access Control (CAC) model.


Sign in / Sign up

Export Citation Format

Share Document